Index Introduction What is Cryptography? Purpose Of cryptography Architecture of cryptography Types of Cryptography Types Of cryptography Algorithms Conclusion INTRODUCTION
The Internet or the global Internet is the internationally
connected network of computer networks with addresses that are administrated by IANA (Internet address and Naming Authority).
There are many aspects to security and many applications,
ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. Cryptography
derived its name from a Greek word called What is Cryptography? “krypto’s” which means “Hidden Secrets”.
Cryptography is the practice and study of hiding information. It
convert a plain intelligible data into an unintelligible data and again retransforming that message into its original form. Authentication: The process of proving one's identity. (The PURPOSE OF CRYPTOGRAPHY primary forms of host-to-host authentication on the Internet.)
Privacy : Ensuring that no one can read the message except
the intended receiver.
Integrity: Assuring the receiver that the received message has
not been altered in any way from the original. Architecture of cryptography
Types of Cryptography
Secret Key Cryptography
• Single key used to encrypt and decrypt.
• Key must be known by both parties.
• Assuming we live in a hostile environment it may be hard to
share a secret key.
One Public Keyof the keys allocated to each person is called the "public Cryptography
key", and is published in an open directory somewhere where
anyone can easily look it up, for example by email address.
Each entity has 2 keys:
Private Key (a secret) Public key (well known). Using Keys Private keys are used for decrypting. Public keys are used for encrypting.
TYPES OF CRYPTOGRAPHIC ALGORITHMS Hash functions Is a type of one-way function this are fundamental for much of cryptography.
A one way function - is a function that is easy to calculate but
hard to invert.
It is difficult to calculate the input to the function given its
output. CONCLUSION We use either private key cryptography or public key cryptography according to requirement.
If we want to send message quickly we use private key
algorithm and if we want to send messages secretly we use public key algorithm. Thanks…!!! Any Query
Nomenclatura - Encyclopedia of modern Cryptography and Internet Security: From AutoCrypt and Exponential Encryption to Zero-Knowledge-Proof Keys [Paperback]